Lecture notes
Introduction
Symmetric ciphers
Hash functions
Key distribution
Asymmetric encryption
Digital signatures
Public key infrastructures
Hands-on
Hands-on 0
Sockets in brief
Code
Utilities for key generation
Skeleton of a client-server communication
Hands-on 0